OAuth

Results: 220



#Item
171Twitter / GNU Debugger / Access token / Computing / OAuth / World Wide Web

Abusing Twitter API Nicolas Seriot … r

Add to Reading List

Source URL: seriot.ch

Language: English - Date: 2013-10-16 05:23:12
172Embedded Linux / Cloud clients / Mobile application development / Python / OAuth / API Management / Mobile application management / IOS / Android / Computing / Software / Smartphones

DATA SHEET Mobile SDK with CA Mobile API Gateway At a Glance The Mobile Software Development Kit (SDK) provided with the CA Mobile API Gateway allows developers to embed

Add to Reading List

Source URL: www.ca.com

Language: English - Date: 2014-09-24 18:31:27
173Identity management / Federated identity / OAuth / Social login / OpenID / Mobile application development / Security Assertion Markup Language / SAML-based products and services / Computing / Computer security / Cloud standards

DATA SHEET CA Layer 7 Mobile Access Gateway™ At a Glance The mobile app has become the central focus for new revenue opportunities, improving employee productivity and innovative

Add to Reading List

Source URL: www.ca.com

Language: English - Date: 2014-03-27 11:29:35
174Java platform / ThoughtWorks / Google Web Toolkit / MongoDB / Clojure / RDFa / OAuth / Java / Google App Engine / Computing / Software / Cross-platform software

Technology Radar http://www.thoughtworks.com/radar Prepared by the ThoughtWorks Technical Advisory Board August 2010

Add to Reading List

Source URL: assets.thoughtworks.com

Language: English - Date: 2013-05-20 09:18:53
175B-tree / Cloud computing / Cloud storage / Secret sharing / Computer security / Computing / Security / Computer network security

1 Fuzzy Authorization for Cloud Storage Shasha Zhu and Guang Gong, Fellow, IEEE Abstract By leveraging and modifying Ciphertext-Policy Attribute Based Encryption (CP-ABE) and OAuth, we propose

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2014-07-25 12:24:57
176Computer security / Web development / Federated identity / OpenID / OAuth / Microformats / DataPortability / .tel / HCard / Computing / Cloud standards / Security

Telnic increases .tel data portability with hCard, OAuth and OpenID Telnic adds its support to DataPortability Project LONDON, United Kingdom – July 7th, 2010 – Telnic Limited (http://telnic.tel), the Registry Operat

Add to Reading List

Source URL: www.telnic.org

Language: English - Date: 2014-10-24 10:12:53
177Security / Cloud standards / Internet protocols / Identity management / Public-key cryptography / OpenID / OAuth / Social login / Security Assertion Markup Language / Federated identity / Computing / Computer security

Pomcor’s Response to the Notice of Inquiry On NSTIC Governance Structure Francisco Corella, PhD [removed] Karen Lewison, MD

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-07-22 18:03:10
178OAuth / Computer security / Security / Federated identity / Access token / OpenID / .tel / Identity management / Social login / Cloud standards / Computing / Internet protocols

Microsoft Word - OAuth-4.docx

Add to Reading List

Source URL: dev.telnic.org

Language: English - Date: 2014-09-26 07:17:27
179Computer security / Security / Access token / Federated identity / Identity management / Cloud standards / Computing / OAuth

Use OAuth for Secure and Manageable Data Connections For Salesforce.com, Google Analytics, and Google BigQuery data sources, you can keep authentication secure with the data provider, while making credentials and extract

Add to Reading List

Source URL: downloads.tableausoftware.com

Language: English - Date: 2014-06-13 18:54:58
180OAuth

Microsoft PowerPoint - Clippinger NSTICWorkshop6[removed]pptx

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-06-29 18:10:44
    UPDATE